https://github.com/onlurking/awesome-infosec?fbclid=IwAR3YNlN9NWZfoaG92EPZgwXYIvwyRGhEG_N73JEznmqkmHXr_afIeAhfnpc A curated list of awesome information security resources, inspired by the awesome-* trend on GitHub.Those resources and tools are intended only for cybersecurity professional and educational use in a controlled environment.Table of ContentsMassive Online Open CoursesAcademic CoursesL..
https://www.peerlyst.com/posts/how-to-build-a-linux-automated-malware-analysis-lab-chiheb-chebbi?fbclid=IwAR0A4xVM9-jBgla2jyu-qoTM8RBbCh32ibKRoipyjuTkJC7ukO42flVb7jM AbstractHi Peerlysters ! This article is going to be like a small guide to give you some glimpses, ideas and suggestions to learn how tobuild a Linux automated Analysis lab using built-in Linux commands, python and open source proje..
https://blog.1234n6.com/2018/10/available-artifacts-evidence-of.html?m=1&fbclid=IwAR195Ch1J6N1TGYFHUY375ZjPKGmxIshQaVzGXSsAkwwnZM9_Zyyio89psQ This week I have been working a case where I was required to identify users on a Windows Server 2003 system who had knowledge of, or had run, a particular unauthorised executable. As such, I found myself wracking my brain for all the user attributable arti..
General SamplestheZoo theZoo is a project created to make the possibility of malware analysis open and available to the public.contagio Contagio is a collection of the latest malware samples, threats, observations, and analyses.Hybrid Analysis Free malware analysis service powered by Payload Security. Using this service you can submit files for in-depth static and dynamic analysis. You can also ..
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some techniques also achieve persi..